Vulnerability & Patch Roundup — March 2026
嗯,用户让我总结一下这篇文章的内容,控制在100字以内,而且不需要用特定的开头。首先,我需要仔细阅读文章,理解它的主要信息。 这篇文章看起来是关于WordPress生态系统的安全更新和漏洞补丁的。里面列了很多插件和主题的漏洞,比如Elementor、Yoast SEO、WPForms等等。每个漏洞都有CVE编号、风险等级和修复步骤。此外,文章还提到了Sucuri防火墙可以虚拟修补这些漏洞,并建议用户安装Web应用防火墙来保护网站。 接下来,我需要把这些信息浓缩到100字以内。重点包括:WordPress插件和主题的漏洞列表、修复建议、Sucuri防火墙的作用以及使用WAF的重要性。 要注意用词简洁,避免重复。例如,“虚拟修补”可以代替“虚拟补丁”,“安装”可以代替“安装Web应用防火墙”。 最后,确保总结准确传达文章的核心内容,不遗漏关键点。 </think> 文章列出了WordPress生态系统中多个插件和主题的安全漏洞及其修复建议,并指出Sucuri防火墙可虚拟修补这些漏洞以保护网站安全。 2026-4-1 20:54:52 Author: blog.sucuri.net(查看原文) 阅读量:0 收藏

Vulnerability reports and responsible disclosures are essential for website security awareness and education. Automated attacks targeting known software vulnerabilities are one of the leading causes of website compromises.

To help educate website owners about potential threats to their environments, we’ve compiled a list of important security updates and vulnerability patches for the WordPress ecosystem this past month.

The vulnerabilities listed below are virtually patched by the Sucuri Firewall and existing clients are protected. If you don’t have it installed yet, you can use our web application firewall to protect your site against known vulnerabilities.


Plugins


Elementor Website Builder – more than just a page builder – Sensitive Data Exposure

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Sensitive Data Exposure
CVE: CVE-2026-1206
Number of Installations: 10,000,000+
Affected Software: Elementor Website Builder – more than just a page builder <= 3.35.7
Patched Versions: Elementor Website Builder – more than just a page builder 3.35.8

Mitigation steps: Update to Elementor Website Builder – more than just a page builder version 3.35.8 or greater.


Yoast SEO – Advanced SEO with real-time guidance and built-in AI – Cross Site Scripting (XSS)

Security Risk: Medium
Exploitation Level: Requires Subscriber or higher level authentication.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2026-3427
Number of Installations: 10,000,000+
Affected Software: Yoast SEO – Advanced SEO with real-time guidance and built-in AI <= 27.1
Patched Versions: Yoast SEO – Advanced SEO with real-time guidance and built-in AI 27.2

Mitigation steps: Update to Yoast SEO – Advanced SEO with real-time guidance and built-in AI version 27.2 or greater.


WPForms – Easy Form Builder for WordPress – Contact Forms, Payment Forms, Surveys, & More – Sensitive Data Exposure

Security Risk: Medium
Exploitation Level: No authentication required.
Vulnerability: Sensitive Data Exposure
CVE: CVE-2026-25339
Number of Installations: 6,000,000+
Affected Software: WPForms – Easy Form Builder for WordPress – Contact Forms, Payment Forms, Surveys, & More <= 1.9.9.1
Patched Versions: WPForms – Easy Form Builder for WordPress – Contact Forms, Payment Forms, Surveys, & More 1.9.9.2

Mitigation steps: Update to WPForms – Easy Form Builder for WordPress – Contact Forms, Payment Forms, Surveys, & More version 1.9.9.2 or greater.


Yoast Duplicate Post – Broken Access Control

Security Risk: Medium
Exploitation Level: Requires Subscriber or higher level authentication.
Vulnerability: Broken Access Control
CVE: CVE-2026-1217
Number of Installations: 4,000,000+
Affected Software: Yoast Duplicate Post <= 4.5
Patched Versions: Yoast Duplicate Post 4.6

Mitigation steps: Update to Yoast Duplicate Post version 4.6 or greater.


Really Simple Security – Simple and Performant Security (formerly Really Simple SSL) – Broken Access Control

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Broken Access Control
CVE: CVE-2026-32461
Number of Installations: 3,000,000+
Affected Software: Really Simple Security – Simple and Performant Security (formerly Really Simple SSL) <= 9.5.7
Patched Versions: Really Simple Security – Simple and Performant Security (formerly Really Simple SSL) 9.5.8

Mitigation steps: Update to Really Simple Security – Simple and Performant Security (formerly Really Simple SSL) version 9.5.8 or greater.


Complianz – GDPR/CCPA Cookie Consent – Cross Site Scripting (XSS)

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2026-2389
Number of Installations: 1,000,000+
Affected Software: Complianz – GDPR/CCPA Cookie Consent <= 7.4.4
Patched Versions: Complianz – GDPR/CCPA Cookie Consent 7.4.5

Mitigation steps: Update to Complianz – GDPR/CCPA Cookie Consent version 7.4.5 or greater.


MC4WP: Mailchimp for WordPress – Broken Access Control

Security Risk: Medium
Exploitation Level: No authentication required.
Vulnerability: Broken Access Control
CVE: CVE-2026-1781
Number of Installations: 1,000,000+
Affected Software: MC4WP: Mailchimp for WordPress <= 4.11.9
Patched Versions: MC4WP: Mailchimp for WordPress 4.12.0

Mitigation steps: Update to MC4WP: Mailchimp for WordPress version 4.12.0 or greater.


Autoptimize – Cross Site Scripting (XSS)

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2026-2430
Number of Installations: 900,000+
Affected Software: Autoptimize <= 3.1.14
Patched Versions: Autoptimize 3.1.15

Mitigation steps: Update to Autoptimize version 3.1.15 or greater.


Autoptimize – Cross Site Scripting (XSS)

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2026-2352
Number of Installations: 900,000+
Affected Software: Autoptimize <= 3.1.14
Patched Versions: Autoptimize 3.1.15

Mitigation steps: Update to Autoptimize version 3.1.15 or greater.


W3 Total Cache – Arbitrary Code Execution

Security Risk: Critical
Exploitation Level: No authentication required.
Vulnerability: Arbitrary Code Execution
CVE: CVE-2026-27384
Number of Installations: 900,000+
Affected Software: W3 Total Cache <= latest
Patched Versions: No Fix

Mitigation steps: No patch available. Consider disabling or removing the plugin until a fix is released.


Smart Slider 3 – Arbitrary File Download

Security Risk: Medium
Exploitation Level: Requires Subscriber or higher level authentication.
Vulnerability: Arbitrary File Download
CVE: CVE-2026-3098
Number of Installations: 800,000+
Affected Software: Smart Slider 3 <= 3.5.1.33
Patched Versions: Smart Slider 3 3.5.1.34

Mitigation steps: Update to Smart Slider 3 version 3.5.1.34 or greater.


The Events Calendar – Arbitrary File Download

Security Risk: High
Exploitation Level: Requires Author or higher level authentication.
Vulnerability: Arbitrary File Download
CVE: CVE-2026-3585
Number of Installations: 700,000+
Affected Software: The Events Calendar <= 6.15.17
Patched Versions: The Events Calendar 6.15.17.1

Mitigation steps: Update to The Events Calendar version 6.15.17.1 or greater.


Ninja Forms – The Contact Form Builder That Grows With You – Sensitive Data Exposure

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Sensitive Data Exposure
CVE: CVE-2026-1307
Number of Installations: 600,000+
Affected Software: Ninja Forms – The Contact Form Builder That Grows With You <= 3.14.1
Patched Versions: Ninja Forms – The Contact Form Builder That Grows With You 3.14.2

Mitigation steps: Update to Ninja Forms – The Contact Form Builder That Grows With You version 3.14.2 or greater.


Royal Addons for Elementor – Addons and Templates Kit for Elementor – Broken Access Control

Security Risk: Medium
Exploitation Level: No authentication required.
Vulnerability: Broken Access Control
CVE: CVE-2026-2373
Number of Installations: 600,000+
Affected Software: Royal Addons for Elementor – Addons and Templates Kit for Elementor <= 1.7.1049
Patched Versions: Royal Addons for Elementor – Addons and Templates Kit for Elementor 1.7.1050

Mitigation steps: Update to Royal Addons for Elementor – Addons and Templates Kit for Elementor version 1.7.1050 or greater.


Royal Addons for Elementor – Addons and Templates Kit for Elementor – Arbitrary File Upload

Security Risk: High
Exploitation Level: Requires Author or higher level authentication.
Vulnerability: Arbitrary File Upload
CVE: CVE-2025-13067
Number of Installations: 600,000+
Affected Software: Royal Addons for Elementor – Addons and Templates Kit for Elementor <= 1.7.1049
Patched Versions: Royal Addons for Elementor – Addons and Templates Kit for Elementor 1.7.1050

Mitigation steps: Update to Royal Addons for Elementor – Addons and Templates Kit for Elementor version 1.7.1050 or greater.


Enable Media Replace – Broken Access Control

Security Risk: Medium
Exploitation Level: Requires Author or higher level authentication.
Vulnerability: Broken Access Control
CVE: CVE-2026-2732
Number of Installations: 600,000+
Affected Software: Enable Media Replace <= 4.1.7
Patched Versions: Enable Media Replace 4.1.8

Mitigation steps: Update to Enable Media Replace version 4.1.8 or greater.


Royal Addons for Elementor – Addons and Templates Kit for Elementor – Other Vulnerability Type

Security Risk: High
Exploitation Level: No authentication required.
Vulnerability: Other Vulnerability Type
CVE: CVE-2026-28135
Number of Installations: 600,000+
Affected Software: Royal Addons for Elementor – Addons and Templates Kit for Elementor <= latest
Patched Versions: No Fix

Mitigation steps: No patch available. Consider disabling or removing the plugin until a fix is released.


SiteGuard WP Plugin – Bypass Vulnerability

Security Risk: Medium
Exploitation Level: No authentication required.
Vulnerability: Bypass Vulnerability
CVE: CVE-2026-27411
Number of Installations: 600,000+
Affected Software: SiteGuard WP Plugin <= latest
Patched Versions: No Fix

Mitigation steps: No patch available. Consider disabling or replacing the plugin.


Ally – Web Accessibility & Usability – SQL Injection

Security Risk: Critical
Exploitation Level: No authentication required.
Vulnerability: SQL Injection
CVE: CVE-2026-2413
Number of Installations: 500,000+
Affected Software: Ally – Web Accessibility & Usability <= 4.0.9
Patched Versions: Ally – Web Accessibility & Usability 4.1.0

Mitigation steps: Update to Ally – Web Accessibility & Usability version 4.1.0 or greater.


Checkout Field Editor (Checkout Manager) for WooCommerce – Cross Site Scripting (XSS)

Security Risk: High
Exploitation Level: No authentication required.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2026-3231
Number of Installations: 500,000+
Affected Software: Checkout Field Editor (Checkout Manager) for WooCommerce <= 2.1.7
Patched Versions: Checkout Field Editor (Checkout Manager) for WooCommerce 2.1.8

Mitigation steps: Update to Checkout Field Editor (Checkout Manager) for WooCommerce version 2.1.8 or greater.


PixelYourSite – Your smart PIXEL (TAG) & API Manager – Cross Site Scripting (XSS)

Security Risk: High
Exploitation Level: No authentication required.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2026-1841
Number of Installations: 500,000+
Affected Software: PixelYourSite – Your smart PIXEL (TAG) & API Manager <= 11.2.0
Patched Versions: PixelYourSite – Your smart PIXEL (TAG) & API Manager 11.2.0.1

Mitigation steps: Update to PixelYourSite – Your smart PIXEL (TAG) & API Manager version 11.2.0.1 or greater.


Meta Box – Arbitrary File Deletion

Security Risk: High
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Arbitrary File Deletion
CVE: CVE-2025-14675
Number of Installations: 500,000+
Affected Software: Meta Box <= 5.11.1
Patched Versions: Meta Box 5.11.2

Mitigation steps: Update to Meta Box version 5.11.2 or greater.


Page Builder by SiteOrigin – Local File Inclusion

Security Risk: High
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Local File Inclusion
CVE: CVE-2026-2448
Number of Installations: 500,000+
Affected Software: Page Builder by SiteOrigin <= 2.33.9
Patched Versions: Page Builder by SiteOrigin 2.34.0

Mitigation steps: Update to Page Builder by SiteOrigin version 2.34.0 or greater.


SureForms – Contact Form, Payment Form & Other Custom Form Builder – Broken Access Control

Security Risk: High
Exploitation Level: No authentication required.
Vulnerability: Broken Access Control
CVE: CVE-2026-4987
Number of Installations: 500,000+
Affected Software: SureForms – Contact Form, Payment Form & Other Custom Form Builder <= 2.5.9
Patched Versions: SureForms – Contact Form, Payment Form & Other Custom Form Builder 2.6.0

Mitigation steps: Update to SureForms – Contact Form, Payment Form & Other Custom Form Builder version 2.6.0 or greater.


Floating Chat Widget: Contact Chat Icons, Telegram Chat, Line Messenger, WeChat, Email, SMS, Call Button – Chaty – Sensitive Data Exposure

Security Risk: High
Exploitation Level: No authentication required.
Vulnerability: Sensitive Data Exposure
CVE: CVE-2026-27370
Number of Installations: 400,000+
Affected Software: Floating Chat Widget: Contact Chat Icons, Telegram Chat, Line Messenger, WeChat, Email, SMS, Call Button – Chaty <= 3.5.1
Patched Versions: Floating Chat Widget: Contact Chat Icons, Telegram Chat, Line Messenger, WeChat, Email, SMS, Call Button – Chaty 3.5.2

Mitigation steps: Update to Chaty version 3.5.2 or greater.


Happy Addons for Elementor – Insecure Direct Object References (IDOR)

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Insecure Direct Object References (IDOR)
CVE: CVE-2026-2917
Number of Installations: 400,000+
Affected Software: Happy Addons for Elementor <= 3.21.0
Patched Versions: Happy Addons for Elementor 3.21.1

Mitigation steps: Update to Happy Addons for Elementor version 3.21.1 or greater.


Happy Addons for Elementor – Cross Site Scripting (XSS)

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2026-2918
Number of Installations: 400,000+
Affected Software: Happy Addons for Elementor <= 3.21.0
Patched Versions: Happy Addons for Elementor 3.21.1

Mitigation steps: Update to Happy Addons for Elementor version 3.21.1 or greater.


Photo Gallery, Sliders, Proofing and Themes – NextGEN Gallery – Local File Inclusion

Security Risk: High
Exploitation Level: Requires Author or higher level authentication.
Vulnerability: Local File Inclusion
CVE: CVE-2026-1463
Number of Installations: 400,000+
Affected Software: Photo Gallery, Sliders, Proofing and Themes – NextGEN Gallery <= 4.0.4
Patched Versions: Photo Gallery, Sliders, Proofing and Themes – NextGEN Gallery 4.0.5

Mitigation steps: Update to NextGEN Gallery version 4.0.5 or greater.


Post SMTP – Complete Email Deliverability and SMTP Solution with Email Logs, Alerts, Backup SMTP & Mobile App – Cross Site Scripting (XSS)

Security Risk: High
Exploitation Level: No authentication required.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2026-3090
Number of Installations: 400,000+
Affected Software: Post SMTP – Complete Email Deliverability and SMTP Solution with Email Logs, Alerts, Backup SMTP & Mobile App <= 3.8.9
Patched Versions: Post SMTP – Complete Email Deliverability and SMTP Solution with Email Logs, Alerts, Backup SMTP & Mobile App 3.9.0

Mitigation steps: Update to Post SMTP – Complete Email Deliverability and SMTP Solution with Email Logs, Alerts, Backup SMTP & Mobile App version 3.9.0 or greater.


Post SMTP – Complete Email Deliverability and SMTP Solution with Email Logs, Alerts, Backup SMTP & Mobile App – Broken Access Control

Security Risk: Medium
Exploitation Level: Requires Subscriber or higher level authentication.
Vulnerability: Broken Access Control
CVE: CVE-2026-2559
Number of Installations: 400,000+
Affected Software: Post SMTP – Complete Email Deliverability and SMTP Solution with Email Logs, Alerts, Backup SMTP & Mobile App <= 3.8.9
Patched Versions: Post SMTP – Complete Email Deliverability and SMTP Solution with Email Logs, Alerts, Backup SMTP & Mobile App 3.9.0

Mitigation steps: Update to Post SMTP – Complete Email Deliverability and SMTP Solution with Email Logs, Alerts, Backup SMTP & Mobile App version 3.9.0 or greater.


Page Builder: Pagelayer – Drag and Drop website builder – Content Injection

Security Risk: Medium
Exploitation Level: No authentication required.
Vulnerability: Content Injection
CVE: CVE-2026-2442
Number of Installations: 400,000+
Affected Software: Page Builder: Pagelayer – Drag and Drop website builder <= 2.0.7
Patched Versions: Page Builder: Pagelayer – Drag and Drop website builder 2.0.8

Mitigation steps: Update to Page Builder: Pagelayer – Drag and Drop website builder version 2.0.8 or greater.


ShortPixel Image Optimizer – Optimize Images, Convert WebP & AVIF – Cross Site Scripting (XSS)

Security Risk: Medium
Exploitation Level: Requires Author or higher level authentication.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2026-4335
Number of Installations: 300,000+
Affected Software: ShortPixel Image Optimizer – Optimize Images, Convert WebP & AVIF <= 6.4.3
Patched Versions: ShortPixel Image Optimizer – Optimize Images, Convert WebP & AVIF 6.4.4

Mitigation steps: Update to ShortPixel Image Optimizer – Optimize Images, Convert WebP & AVIF version 6.4.4 or greater.


WP Go Maps (formerly WP Google Maps) – Cross Site Scripting (XSS)

Security Risk: Medium
Exploitation Level: Requires Subscriber or higher level authentication.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2026-4268
Number of Installations: 300,000+
Affected Software: WP Go Maps (formerly WP Google Maps) <= 10.0.05
Patched Versions: WP Go Maps (formerly WP Google Maps) 10.0.06

Mitigation steps: Update to WP Go Maps (formerly WP Google Maps) version 10.0.06 or greater.


WP Mail Logging – PHP Object Injection

Security Risk: Critical
Exploitation Level: No authentication required.
Vulnerability: PHP Object Injection
CVE: CVE-2026-2471
Number of Installations: 300,000+
Affected Software: WP Mail Logging <= 1.15
Patched Versions: WP Mail Logging 1.16

Mitigation steps: Update to WP Mail Logging version 1.16 or greater.


Formidable Forms – Contact Form Plugin, Survey, Quiz, Payment, Calculator Form & Custom Form Builder – Broken Authentication

Security Risk: Medium
Exploitation Level: No authentication required.
Vulnerability: Broken Authentication
CVE: CVE-2026-2888
Number of Installations: 300,000+
Affected Software: Formidable Forms – Contact Form Plugin, Survey, Quiz, Payment, Calculator Form & Custom Form Builder <= 6.28
Patched Versions: Formidable Forms – Contact Form Plugin, Survey, Quiz, Payment, Calculator Form & Custom Form Builder 6.29

Mitigation steps: Update to Formidable Forms – Contact Form Plugin, Survey, Quiz, Payment, Calculator Form & Custom Form Builder version 6.29 or greater.


Formidable Forms – Contact Form Plugin, Survey, Quiz, Payment, Calculator Form & Custom Form Builder – Broken Access Control

Security Risk: High
Exploitation Level: No authentication required.
Vulnerability: Broken Access Control
CVE: CVE-2026-2890
Number of Installations: 300,000+
Affected Software: Formidable Forms – Contact Form Plugin, Survey, Quiz, Payment, Calculator Form & Custom Form Builder <= 6.28
Patched Versions: Formidable Forms – Contact Form Plugin, Survey, Quiz, Payment, Calculator Form & Custom Form Builder 6.29

Mitigation steps: Update to Formidable Forms – Contact Form Plugin, Survey, Quiz, Payment, Calculator Form & Custom Form Builder version 6.29 or greater.


ExactMetrics – Google Analytics Dashboard for WordPress (Website Stats Plugin) – Privilege Escalation

Security Risk: Critical
Exploitation Level: Custom role
Vulnerability: Privilege Escalation
CVE: CVE-2026-1993
Number of Installations: 300,000+
Affected Software: ExactMetrics – Google Analytics Dashboard for WordPress (Website Stats Plugin) <= 9.0.2
Patched Versions: ExactMetrics – Google Analytics Dashboard for WordPress (Website Stats Plugin) 9.0.3

Mitigation steps: Update to ExactMetrics – Google Analytics Dashboard for WordPress (Website Stats Plugin) version 9.0.3 or greater.


ExactMetrics – Google Analytics Dashboard for WordPress (Website Stats Plugin) – Insecure Direct Object References (IDOR)

Security Risk: High
Exploitation Level: Custom role
Vulnerability: Insecure Direct Object References (IDOR)
CVE: CVE-2026-1992
Number of Installations: 300,000+
Affected Software: ExactMetrics – Google Analytics Dashboard for WordPress (Website Stats Plugin) <= 9.0.2
Patched Versions: ExactMetrics – Google Analytics Dashboard for WordPress (Website Stats Plugin) 9.0.3

Mitigation steps: Update to ExactMetrics – Google Analytics Dashboard for WordPress (Website Stats Plugin) version 9.0.3 or greater.


Unlimited Elements For Elementor – Cross Site Scripting (XSS)

Security Risk: High
Exploitation Level: No authentication required.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2026-2724
Number of Installations: 300,000+
Affected Software: Unlimited Elements For Elementor <= 2.0.5
Patched Versions: Unlimited Elements For Elementor 2.0.6

Mitigation steps: Update to Unlimited Elements For Elementor version 2.0.6 or greater.


Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin – Privilege Escalation

Security Risk: High
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Privilege Escalation
CVE: CVE-2026-4248
Number of Installations: 200,000+
Affected Software: Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin <= 2.11.2
Patched Versions: Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin 2.11.3

Mitigation steps: Update to Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin version 2.11.3 or greater.


Dear Flipbook – PDF Flipbook, 3D Flipbook, PDF embed, PDF viewer – Cross Site Scripting (XSS)

Security Risk: Medium
Exploitation Level: Requires Author or higher level authentication.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2026-2569
Number of Installations: 100,000+
Affected Software: Dear Flipbook – PDF Flipbook, 3D Flipbook, PDF embed, PDF viewer <= 2.4.26
Patched Versions: Dear Flipbook – PDF Flipbook, 3D Flipbook, PDF embed, PDF viewer 2.4.27

Mitigation steps: Update to Dear Flipbook – PDF Flipbook, 3D Flipbook, PDF embed, PDF viewer version 2.4.27 or greater.


Envira Gallery – Image Photo Gallery, Albums, Video Gallery, Slideshows & More – Cross Site Scripting (XSS)

Security Risk: Medium
Exploitation Level: Requires Author or higher level authentication.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2026-1236
Number of Installations: 100,000+
Affected Software: Envira Gallery – Image Photo Gallery, Albums, Video Gallery, Slideshows & More <= 1.12.3
Patched Versions: Envira Gallery – Image Photo Gallery, Albums, Video Gallery, Slideshows & More 1.12.4

Mitigation steps: Update to Envira Gallery – Image Photo Gallery, Albums, Video Gallery, Slideshows & More version 1.12.4 or greater.


Widget Options – Advanced Conditional Visibility for Gutenberg Blocks & Classic Widgets – Remote Code Execution (RCE)

Security Risk: Critical
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Remote Code Execution (RCE)
CVE: CVE-2026-27984
Number of Installations: 100,000+
Affected Software: Widget Options – Advanced Conditional Visibility for Gutenberg Blocks & Classic Widgets <= latest
Patched Versions: No Fix

Mitigation steps: No patch available. Consider disabling or removing the plugin until a fix is released.


AI Engine – The Chatbot, AI Framework & MCP for WordPress – Arbitrary File Upload

Security Risk: Critical
Exploitation Level: Requires Editor or higher level authentication.
Vulnerability: Arbitrary File Upload
CVE: CVE-2026-23802
Number of Installations: 100,000+
Affected Software: AI Engine – The Chatbot, AI Framework & MCP for WordPress <= 3.3.2
Patched Versions: AI Engine – The Chatbot, AI Framework & MCP for WordPress 3.3.3

Mitigation steps: Update to AI Engine – The Chatbot, AI Framework & MCP for WordPress version 3.3.3 or greater.


Download Manager – Broken Access Control

Security Risk: Medium
Exploitation Level: Requires Subscriber or higher level authentication.
Vulnerability: Broken Access Control
CVE: CVE-2026-2571
Number of Installations: 100,000+
Affected Software: Download Manager <= 3.3.49
Patched Versions: Download Manager 3.3.50

Mitigation steps: Update to Download Manager version 3.3.50 or greater.


LatePoint – Calendar Booking Plugin for Appointments and Events – Insecure Direct Object References (IDOR)

Security Risk: Medium
Exploitation Level: Requires Subscriber or higher level authentication.
Vulnerability: Insecure Direct Object References (IDOR)
CVE: CVE-2026-32533
Number of Installations: 100,000+
Affected Software: LatePoint – Calendar Booking Plugin for Appointments and Events <= 5.2.6
Patched Versions: LatePoint – Calendar Booking Plugin for Appointments and Events 5.2.7

Mitigation steps: Update to LatePoint – Calendar Booking Plugin for Appointments and Events version 5.2.7 or greater.


LatePoint – Calendar Booking Plugin for Appointments and Events – Cross Site Scripting (XSS)

Security Risk: High
Exploitation Level: No authentication required.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2026-2324
Number of Installations: 100,000+
Affected Software: LatePoint – Calendar Booking Plugin for Appointments and Events <= 5.2.7
Patched Versions: LatePoint – Calendar Booking Plugin for Appointments and Events 5.2.8

Mitigation steps: Update to LatePoint – Calendar Booking Plugin for Appointments and Events version 5.2.8 or greater.


LatePoint – Calendar Booking Plugin for Appointments and Events – SQL Injection

Security Risk: High
Exploitation Level: Requires Administrator or higher level authentication.
Vulnerability: SQL Injection
CVE: CVE-2026-1487
Number of Installations: 100,000+
Affected Software: LatePoint – Calendar Booking Plugin for Appointments and Events <= 5.2.7
Patched Versions: LatePoint – Calendar Booking Plugin for Appointments and Events 5.2.8

Mitigation steps: Update to LatePoint – Calendar Booking Plugin for Appointments and Events version 5.2.8 or greater.


LatePoint – Calendar Booking Plugin for Appointments and Events – Privilege Escalation

Security Risk: High
Exploitation Level: Requires Agent or higher level authentication.
Vulnerability: Privilege Escalation
CVE: CVE-2026-1566
Number of Installations: 100,000+
Affected Software: LatePoint – Calendar Booking Plugin for Appointments and Events <= 5.2.7
Patched Versions: LatePoint – Calendar Booking Plugin for Appointments and Events 5.2.8

Mitigation steps: Update to LatePoint – Calendar Booking Plugin for Appointments and Events version 5.2.8 or greater.


My Sticky Bar – Floating Notification Bar & Sticky Header (formerly myStickymenu) – SQL Injection

Security Risk: Critical
Exploitation Level: No authentication required.
Vulnerability: SQL Injection
CVE: CVE-2026-3657
Number of Installations: 100,000+
Affected Software: My Sticky Bar – Floating Notification Bar & Sticky Header (formerly myStickymenu) <= 2.8.6
Patched Versions: My Sticky Bar – Floating Notification Bar & Sticky Header (formerly myStickymenu) 2.8.7

Mitigation steps: Update to My Sticky Bar – Floating Notification Bar & Sticky Header (formerly myStickymenu) version 2.8.7 or greater.


Social Icons Widget & Block – Social Media Icons & Share Buttons – Broken Access Control

Security Risk: Medium
Exploitation Level: Requires Subscriber or higher level authentication.
Vulnerability: Broken Access Control
CVE: CVE-2026-4063
Number of Installations: 100,000+
Affected Software: Social Icons Widget & Block – Social Media Icons & Share Buttons <= 4.5.8
Patched Versions: Social Icons Widget & Block – Social Media Icons & Share Buttons 4.5.9

Mitigation steps: Update to Social Icons Widget & Block – Social Media Icons & Share Buttons version 4.5.9 or greater.


Tutor LMS – eLearning and online course solution – Insecure Direct Object References (IDOR)

Security Risk: Medium
Exploitation Level: Requires Subscriber or higher level authentication.
Vulnerability: Insecure Direct Object References (IDOR)
CVE: CVE-2025-32223
Number of Installations: 100,000+
Affected Software: Tutor LMS – eLearning and online course solution <= 3.9.4
Patched Versions: Tutor LMS – eLearning and online course solution 3.9.5

Mitigation steps: Update to Tutor LMS – eLearning and online course solution version 3.9.5 or greater.


Tutor LMS – eLearning and online course solution – Broken Access Control

Security Risk: Medium
Exploitation Level: Requires Subscriber or higher level authentication.
Vulnerability: Broken Access Control
CVE: CVE-2026-23799
Number of Installations: 100,000+
Affected Software: Tutor LMS – eLearning and online course solution <= 3.9.5
Patched Versions: Tutor LMS – eLearning and online course solution 3.9.6

Mitigation steps: Update to Tutor LMS – eLearning and online course solution version 3.9.6 or greater.


Tutor LMS – eLearning and online course solution – SQL Injection

Security Risk: Critical
Exploitation Level: No authentication required.
Vulnerability: SQL Injection
CVE: CVE-2025-13673
Number of Installations: 100,000+
Affected Software: Tutor LMS – eLearning and online course solution <= 3.9.6
Patched Versions: Tutor LMS – eLearning and online course solution 3.9.7

Mitigation steps: Update to Tutor LMS – eLearning and online course solution version 3.9.7 or greater.


Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress – Insecure Direct Object References (IDOR)

Security Risk: High
Exploitation Level: Requires Subscriber or higher level authentication.
Vulnerability: Insecure Direct Object References (IDOR)
CVE: CVE-2026-3453
Number of Installations: 100,000+
Affected Software: Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress <= 4.16.11
Patched Versions: Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress 4.16.12

Mitigation steps: Update to Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress version 4.16.12 or greater.


WP All Import – Drag & Drop Import for CSV, XML, Excel & Google Sheets – Cross Site Scripting (XSS)

Security Risk: High
Exploitation Level: No authentication required.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2026-2830
Number of Installations: 100,000+
Affected Software: WP All Import – Drag & Drop Import for CSV, XML, Excel & Google Sheets <= 4.0.0
Patched Versions: WP All Import – Drag & Drop Import for CSV, XML, Excel & Google Sheets 4.0.1

Mitigation steps: Update to WP All Import – Drag & Drop Import for CSV, XML, Excel & Google Sheets version 4.0.1 or greater.


Download Monitor – Insecure Direct Object References (IDOR)

Security Risk: Medium
Exploitation Level: No authentication required.
Vulnerability: Insecure Direct Object References (IDOR)
CVE: CVE-2026-3124
Number of Installations: 90,000+
Affected Software: Download Monitor <= 5.1.7
Patched Versions: Download Monitor 5.1.8

Mitigation steps: Update to Download Monitor version 5.1.8 or greater.


JetFormBuilder — Dynamic Blocks Form Builder – Arbitrary File Download

Security Risk: High
Exploitation Level: No authentication required.
Vulnerability: Arbitrary File Download
CVE: CVE-2026-4373
Number of Installations: 90,000+
Affected Software: JetFormBuilder — Dynamic Blocks Form Builder <= 3.5.6.2
Patched Versions: JetFormBuilder — Dynamic Blocks Form Builder 3.5.6.3

Mitigation steps: Update to JetFormBuilder — Dynamic Blocks Form Builder version 3.5.6.3 or greater.


JetFormBuilder — Dynamic Blocks Form Builder – Remote Code Execution (RCE)

Security Risk: Critical
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Remote Code Execution (RCE)
CVE: CVE-2026-32525
Number of Installations: 90,000+
Affected Software: JetFormBuilder — Dynamic Blocks Form Builder <= 3.5.6.1
Patched Versions: JetFormBuilder — Dynamic Blocks Form Builder 3.5.6.2

Mitigation steps: Update to JetFormBuilder — Dynamic Blocks Form Builder version 3.5.6.2 or greater.


Booking for Appointments and Events Calendar – Amelia – Privilege Escalation

Security Risk: High
Exploitation Level: Custom role
Vulnerability: Privilege Escalation
CVE: CVE-2026-24963
Number of Installations: 90,000+
Affected Software: Booking for Appointments and Events Calendar – Amelia <= 1.9.9
Patched Versions: Booking for Appointments and Events Calendar – Amelia 2.0

Mitigation steps: Update to Booking for Appointments and Events Calendar – Amelia version 2.0 or greater.


Booking for Appointments and Events Calendar – Amelia – Broken Authentication

Security Risk: High
Exploitation Level: Requires Customer or higher level authentication.
Vulnerability: Broken Authentication
CVE: CVE-2026-2931
Number of Installations: 90,000+
Affected Software: Booking for Appointments and Events Calendar – Amelia <= 9.1
Patched Versions: Booking for Appointments and Events Calendar – Amelia 9.2

Mitigation steps: Update to Booking for Appointments and Events Calendar – Amelia version 9.2 or greater.


Import and export users and customers – Privilege Escalation

Security Risk: High
Exploitation Level: No authentication required.
Vulnerability: Privilege Escalation
CVE: CVE-2026-3629
Number of Installations: 80,000+
Affected Software: Import and export users and customers <= 1.9.9
Patched Versions: Import and export users and customers 2.0

Mitigation steps: Update to Import and export users and customers version 2.0 or greater.


Jupiter X Core – Broken Access Control

Security Risk: High
Exploitation Level: Requires Subscriber or higher level authentication.
Vulnerability: Broken Access Control
CVE: CVE-2026-3533
Number of Installations: 80,000+
Affected Software: Jupiter X Core <= 4.14.1
Patched Versions: Jupiter X Core 4.14.2

Mitigation steps: Update to Jupiter X Core version 4.14.2 or greater.


SlimStat Analytics – Cross Site Scripting (XSS)

Security Risk: High
Exploitation Level: No authentication required.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2026-1238
Number of Installations: 80,000+
Affected Software: SlimStat Analytics <= 5.3.9
Patched Versions: SlimStat Analytics 5.4.0

Mitigation steps: Update to SlimStat Analytics version 5.4.0 or greater.


LearnPress – WordPress LMS Plugin for Create and Sell Online Courses – Broken Access Control

Security Risk: Medium
Exploitation Level: Requires Subscriber or higher level authentication.
Vulnerability: Broken Access Control
CVE: CVE-2026-3225
Number of Installations: 80,000+
Affected Software: LearnPress – WordPress LMS Plugin for Create and Sell Online Courses <= 4.3.2
Patched Versions: LearnPress – WordPress LMS Plugin for Create and Sell Online Courses 4.3.3

Mitigation steps: Update to LearnPress – WordPress LMS Plugin for Create and Sell Online Courses version 4.3.3 or greater.


LearnPress – WordPress LMS Plugin for Create and Sell Online Courses – Broken Access Control

Security Risk: Medium
Exploitation Level: Requires Subscriber or higher level authentication.
Vulnerability: Broken Access Control
CVE: CVE-2026-3226
Number of Installations: 80,000+
Affected Software: LearnPress – WordPress LMS Plugin for Create and Sell Online Courses <= 4.3.2
Patched Versions: LearnPress – WordPress LMS Plugin for Create and Sell Online Courses 4.3.3

Mitigation steps: Update to LearnPress – WordPress LMS Plugin for Create and Sell Online Courses version 4.3.3 or greater.


Online Scheduling and Appointment Booking System – Bookly – Cross Site Scripting (XSS)

Security Risk: High
Exploitation Level: No authentication required.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2026-32540
Number of Installations: 70,000+
Affected Software: Online Scheduling and Appointment Booking System – Bookly <= 26.7
Patched Versions: Online Scheduling and Appointment Booking System – Bookly 26.8

Mitigation steps: Update to Online Scheduling and Appointment Booking System – Bookly version 26.8 or greater.


EmailKit – Email Customizer for WooCommerce & WP – Path Traversal

Security Risk: Medium
Exploitation Level: Requires Administrator or higher level authentication.
Vulnerability: Path Traversal
CVE: CVE-2026-3474
Number of Installations: 70,000+
Affected Software: EmailKit – Email Customizer for WooCommerce & WP <= 1.6.3
Patched Versions: EmailKit – Email Customizer for WooCommerce & WP 1.6.4

Mitigation steps: Update to EmailKit – Email Customizer for WooCommerce & WP version 1.6.4 or greater.


SMTP Mailer – Sensitive Data Exposure

Security Risk: High
Exploitation Level: No authentication required.
Vulnerability: Sensitive Data Exposure
CVE: CVE-2026-32538
Number of Installations: 70,000+
Affected Software: SMTP Mailer <= 1.1.24
Patched Versions: SMTP Mailer 1.1.25

Mitigation steps: Update to SMTP Mailer version 1.1.25 or greater.


GetGenie – AI Content Writer with Keyword Research & SEO Tracking Tools – Cross Site Scripting (XSS)

Security Risk: Medium
Exploitation Level: Requires Author or higher level authentication.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2026-2257
Number of Installations: 70,000+
Affected Software: GetGenie – AI Content Writer with Keyword Research & SEO Tracking Tools <= 4.3.2
Patched Versions: GetGenie – AI Content Writer with Keyword Research & SEO Tracking Tools 4.3.3

Mitigation steps: Update to GetGenie – AI Content Writer with Keyword Research & SEO Tracking Tools version 4.3.3 or greater.


GetGenie – AI Content Writer with Keyword Research & SEO Tracking Tools – Insecure Direct Object References (IDOR)

Security Risk: Medium
Exploitation Level: Requires Author or higher level authentication.
Vulnerability: Insecure Direct Object References (IDOR)
CVE: CVE-2026-2879
Number of Installations: 70,000+
Affected Software: GetGenie – AI Content Writer with Keyword Research & SEO Tracking Tools <= 4.3.2
Patched Versions: GetGenie – AI Content Writer with Keyword Research & SEO Tracking Tools 4.3.3

Mitigation steps: Update to GetGenie – AI Content Writer with Keyword Research & SEO Tracking Tools version 4.3.3 or greater.


Database for Contact Form 7, WPforms, Elementor forms – PHP Object Injection

Security Risk: Critical
Exploitation Level: No authentication required.
Vulnerability: PHP Object Injection
CVE: CVE-2026-2599
Number of Installations: 70,000+
Affected Software: Database for Contact Form 7, WPforms, Elementor forms <= 1.4.7
Patched Versions: Database for Contact Form 7, WPforms, Elementor forms 1.4.8

Mitigation steps: Update to Database for Contact Form 7, WPforms, Elementor forms version 1.4.8 or greater.


Greenshift – animation and page builder blocks – Broken Access Control

Security Risk: Medium
Exploitation Level: No authentication required.
Vulnerability: Broken Access Control
CVE: CVE-2026-2371
Number of Installations: 70,000+
Affected Software: Greenshift – animation and page builder blocks <= 12.8.3
Patched Versions: Greenshift – animation and page builder blocks 12.8.4

Mitigation steps: Update to Greenshift – animation and page builder blocks version 12.8.4 or greater.


Greenshift – animation and page builder blocks – Broken Access Control

Security Risk: Medium
Exploitation Level: No authentication required.
Vulnerability: Broken Access Control
CVE: CVE-2026-2589
Number of Installations: 70,000+
Affected Software: Greenshift – animation and page builder blocks <= 12.8.3
Patched Versions: Greenshift – animation and page builder blocks 12.8.4

Mitigation steps: Update to Greenshift – animation and page builder blocks version 12.8.4 or greater.


Greenshift – animation and page builder blocks – Cross Site Scripting (XSS)

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2026-2593
Number of Installations: 70,000+
Affected Software: Greenshift – animation and page builder blocks <= 12.8.5
Patched Versions: Greenshift – animation and page builder blocks 12.8.6

Mitigation steps: Update to Greenshift – animation and page builder blocks version 12.8.6 or greater.


Media Library Assistant – Broken Access Control

Security Risk: Medium
Exploitation Level: Requires Subscriber or higher level authentication.
Vulnerability: Broken Access Control
CVE: CVE-2026-3072
Number of Installations: 70,000+
Affected Software: Media Library Assistant <= 3.33
Patched Versions: Media Library Assistant 3.34

Mitigation steps: Update to Media Library Assistant version 3.34 or greater.


wpDataTables – WordPress Data Table, Dynamic Tables & Table Charts Plugin – Local File Inclusion

Security Risk: High
Exploitation Level: No authentication required.
Vulnerability: Local File Inclusion
CVE: CVE-2026-28039
Number of Installations: 70,000+
Affected Software: wpDataTables – WordPress Data Table, Dynamic Tables & Table Charts Plugin <= 6.5.0.1
Patched Versions: wpDataTables – WordPress Data Table, Dynamic Tables & Table Charts Plugin 6.5.0.2

Mitigation steps: Update to wpDataTables – WordPress Data Table, Dynamic Tables & Table Charts Plugin version 6.5.0.2 or greater.


WP ULike – Like & Dislike Buttons for Engagement and Feedback – Cross Site Scripting (XSS)

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2026-2358
Number of Installations: 70,000+
Affected Software: WP ULike – Like & Dislike Buttons for Engagement and Feedback <= latest
Patched Versions: No Fix

Mitigation steps: No patch available. Consider disabling or removing the plugin until a fix is released.


Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin – Broken Access Control

Security Risk: High
Exploitation Level: No authentication required.
Vulnerability: Broken Access Control
CVE: CVE-2026-3045
Number of Installations: 60,000+
Affected Software: Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin <= 1.6.9.9
Patched Versions: Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin 1.6.10.0

Mitigation steps: Update to Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin version 1.6.10.0 or greater.


Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin – Sensitive Data Exposure

Security Risk: Medium
Exploitation Level: Requires Staff or higher level authentication.
Vulnerability: Sensitive Data Exposure
CVE: CVE-2026-1704
Number of Installations: 60,000+
Affected Software: Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin <= 1.6.9.9
Patched Versions: Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin 1.6.10.0

Mitigation steps: Update to Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin version 1.6.10.0 or greater.


Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin – SQL Injection

Security Risk: Critical
Exploitation Level: No authentication required.
Vulnerability: SQL Injection
CVE: CVE-2026-1708
Number of Installations: 60,000+
Affected Software: Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin <= 1.6.9.28
Patched Versions: Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin 1.6.9.29

Mitigation steps: Update to Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin version 1.6.9.29 or greater.


Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin – SQL Injection

Security Risk: Critical
Exploitation Level: No authentication required.
Vulnerability: SQL Injection
CVE: CVE-2026-3658
Number of Installations: 60,000+
Affected Software: Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin <= 1.6.10.1
Patched Versions: Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin 1.6.10.2

Mitigation steps: Update to Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin version 1.6.10.2 or greater.


Contextual Related Posts – Broken Access Control

Security Risk: Medium
Exploitation Level: No authentication required.
Vulnerability: Broken Access Control
CVE: CVE-2026-32565
Number of Installations: 60,000+
Affected Software: Contextual Related Posts <= 4.2.1
Patched Versions: Contextual Related Posts 4.2.2

Mitigation steps: Update to Contextual Related Posts version 4.2.2 or greater.


Drag and Drop Multiple File Upload for Contact Form 7 – Arbitrary File Upload

Security Risk: Critical
Exploitation Level: No authentication required.
Vulnerability: Arbitrary File Upload
CVE: CVE-2026-3459
Number of Installations: 60,000+
Affected Software: Drag and Drop Multiple File Upload for Contact Form 7 <= 1.3.9.5
Patched Versions: Drag and Drop Multiple File Upload for Contact Form 7 1.3.9.6

Mitigation steps: Update to Drag and Drop Multiple File Upload for Contact Form 7 version 1.3.9.6 or greater.


Email Subscribers & Newsletters – Email Marketing, Post Notifications & Newsletter Plugin for WordPress – SQL Injection

Security Risk: High
Exploitation Level: Requires Administrator or higher level authentication.
Vulnerability: SQL Injection
CVE: CVE-2026-1651
Number of Installations: 60,000+
Affected Software: Email Subscribers & Newsletters – Email Marketing, Post Notifications & Newsletter Plugin for WordPress <= 5.9.16
Patched Versions: Email Subscribers & Newsletters – Email Marketing, Post Notifications & Newsletter Plugin for WordPress 5.9.17

Mitigation steps: Update to Email Subscribers & Newsletters – Email Marketing, Post Notifications & Newsletter Plugin for WordPress version 5.9.17 or greater.


Fast Page & Post Duplicator – SQL Injection

Security Risk: High
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: SQL Injection
CVE: CVE-2026-2893
Number of Installations: 60,000+
Affected Software: Fast Page & Post Duplicator <= 6.3
Patched Versions: Fast Page & Post Duplicator 6.4

Mitigation steps: Update to Fast Page & Post Duplicator version 6.4 or greater.


Seraphinite Accelerator – Sensitive Data Exposure

Security Risk: Medium
Exploitation Level: Requires Subscriber or higher level authentication.
Vulnerability: Sensitive Data Exposure
CVE: CVE-2026-3058
Number of Installations: 60,000+
Affected Software: Seraphinite Accelerator <= 2.28.14
Patched Versions: Seraphinite Accelerator 2.28.15

Mitigation steps: Update to Seraphinite Accelerator version 2.28.15 or greater.


Seraphinite Accelerator – Broken Access Control

Security Risk: Medium
Exploitation Level: Requires Subscriber or higher level authentication.
Vulnerability: Broken Access Control
CVE: CVE-2026-3056
Number of Installations: 60,000+
Affected Software: Seraphinite Accelerator <= 2.28.14
Patched Versions: Seraphinite Accelerator 2.28.15

Mitigation steps: Update to Seraphinite Accelerator version 2.28.15 or greater.


Product Filter for WooCommerce by WBW – Broken Access Control

Security Risk: Medium
Exploitation Level: No authentication required.
Vulnerability: Broken Access Control
CVE: CVE-2026-3138
Number of Installations: 60,000+
Affected Software: Product Filter for WooCommerce by WBW <= 3.1.2
Patched Versions: Product Filter for WooCommerce by WBW 3.1.3

Mitigation steps: Update to Product Filter for WooCommerce by WBW version 3.1.3 or greater.


User Registration & Membership – Free & Paid Memberships, Subscriptions, Content Restriction, User Profile, Custom User Registration & Login Builder – Privilege Escalation

Security Risk: Critical
Exploitation Level: No authentication required.
Vulnerability: Privilege Escalation
CVE: CVE-2026-1492
Number of Installations: 60,000+
Affected Software: User Registration & Membership – Free & Paid Memberships, Subscriptions, Content Restriction, User Profile, Custom User Registration & Login Builder <= 5.1.2
Patched Versions: User Registration & Membership – Free & Paid Memberships, Subscriptions, Content Restriction, User Profile, Custom User Registration & Login Builder 5.1.3

Mitigation steps: Update to User Registration & Membership – Free & Paid Memberships, Subscriptions, Content Restriction, User Profile, Custom User Registration & Login Builder version 5.1.3 or greater.


User Registration & Membership – Free & Paid Memberships, Subscriptions, Content Restriction, User Profile, Custom User Registration & Login Builder – Privilege Escalation

Security Risk: High
Exploitation Level: No authentication required.
Vulnerability: Privilege Escalation
CVE: CVE-2026-32488
Number of Installations: 60,000+
Affected Software: User Registration & Membership – Free & Paid Memberships, Subscriptions, Content Restriction, User Profile, Custom User Registration & Login Builder <= 5.1.2
Patched Versions: User Registration & Membership – Free & Paid Memberships, Subscriptions, Content Restriction, User Profile, Custom User Registration & Login Builder 5.1.3

Mitigation steps: Update to User Registration & Membership – Free & Paid Memberships, Subscriptions, Content Restriction, User Profile, Custom User Registration & Login Builder version 5.1.3 or greater.


User Registration & Membership – Free & Paid Memberships, Subscriptions, Content Restriction, User Profile, Custom User Registration & Login Builder – Broken Access Control

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Broken Access Control
CVE: CVE-2026-4056
Number of Installations: 60,000+
Affected Software: User Registration & Membership – Free & Paid Memberships, Subscriptions, Content Restriction, User Profile, Custom User Registration & Login Builder <= 5.1.4
Patched Versions: User Registration & Membership – Free & Paid Memberships, Subscriptions, Content Restriction, User Profile, Custom User Registration & Login Builder 5.1.5

Mitigation steps: Update to User Registration & Membership – Free & Paid Memberships, Subscriptions, Content Restriction, User Profile, Custom User Registration & Login Builder version 5.1.5 or greater.


Ultra Addons for Contact Form 7 – Cross Site Scripting (XSS)

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2026-32460
Number of Installations: 60,000+
Affected Software: Ultra Addons for Contact Form 7 <= 3.5.36
Patched Versions: Ultra Addons for Contact Form 7 3.5.37

Mitigation steps: Update to Ultra Addons for Contact Form 7 version 3.5.37 or greater.


Visual Portfolio, Photo Gallery & Post Grid – Local File Inclusion

Security Risk: High
Exploitation Level: Requires Subscriber or higher level authentication.
Vulnerability: Local File Inclusion
CVE: CVE-2026-32537
Number of Installations: 60,000+
Affected Software: Visual Portfolio, Photo Gallery & Post Grid <= 3.5.1
Patched Versions: Visual Portfolio, Photo Gallery & Post Grid 3.5.2

Mitigation steps: Update to Visual Portfolio, Photo Gallery & Post Grid version 3.5.2 or greater.


Woody Code Snippets – Insert PHP, CSS, JS, and Header/Footer Scripts – Remote Code Execution (RCE)

Security Risk: Critical
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Remote Code Execution (RCE)
CVE: CVE-2026-25366
Number of Installations: 60,000+
Affected Software: Woody Code Snippets – Insert PHP, CSS, JS, and Header/Footer Scripts <= 2.7.1
Patched Versions: Woody Code Snippets – Insert PHP, CSS, JS, and Header/Footer Scripts 2.7.2

Mitigation steps: Update to Woody Code Snippets – Insert PHP, CSS, JS, and Header/Footer Scripts version 2.7.2 or greater.


WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters – SQL Injection

Security Risk: Critical
Exploitation Level: No authentication required.
Vulnerability: SQL Injection
CVE: CVE-2026-3222
Number of Installations: 60,000+
Affected Software: WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters <= 4.9.1
Patched Versions: WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters 4.9.2

Mitigation steps: Update to WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters version 4.9.2 or greater.


WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters – SQL Injection

Security Risk: Critical
Exploitation Level: No authentication required.
Vulnerability: SQL Injection
CVE: CVE-2026-2580
Number of Installations: 60,000+
Affected Software: WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters <= 4.9.1
Patched Versions: WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters 4.9.2

Mitigation steps: Update to WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters version 4.9.2 or greater.


Advanced Product Fields (Product Addons) for WooCommerce – Broken Access Control

Security Risk: Medium
Exploitation Level: No authentication required.
Vulnerability: Broken Access Control
CVE: CVE-2026-32457
Number of Installations: 50,000+
Affected Software: Advanced Product Fields (Product Addons) for WooCommerce <= 1.6.18
Patched Versions: Advanced Product Fields (Product Addons) for WooCommerce 1.6.19

Mitigation steps: Update to Advanced Product Fields (Product Addons) for WooCommerce version 1.6.19 or greater.


Blog2Social: Social Media Auto Post & Scheduler – Broken Access Control

Security Risk: Medium
Exploitation Level: Requires Subscriber or higher level authentication.
Vulnerability: Broken Access Control
CVE: CVE-2026-4331
Number of Installations: 50,000+
Affected Software: Blog2Social: Social Media Auto Post & Scheduler <= 8.8.2
Patched Versions: Blog2Social: Social Media Auto Post & Scheduler 8.8.3

Mitigation steps: Update to Blog2Social: Social Media Auto Post & Scheduler version 8.8.3 or greater.


RTMKit – Cross Site Scripting (XSS)

Security Risk: High
Exploitation Level: No authentication required.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2025-12473
Number of Installations: 50,000+
Affected Software: RTMKit <= 1.9.9
Patched Versions: RTMKit 2.0.0

Mitigation steps: Update to RTMKit version 2.0.0 or greater.


RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging – Cross Site Scripting (XSS)

Security Risk: High
Exploitation Level: No authentication required.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2026-2433
Number of Installations: 50,000+
Affected Software: RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging <= 5.0.11
Patched Versions: RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging 5.0.12

Mitigation steps: Update to RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging version 5.0.12 or greater.


OoohBoi Steroids for Elementor – Cross Site Scripting (XSS)

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2026-3034
Number of Installations: 50,000+
Affected Software: OoohBoi Steroids for Elementor <= 2.1.24
Patched Versions: OoohBoi Steroids for Elementor 2.1.25

Mitigation steps: Update to OoohBoi Steroids for Elementor version 2.1.25 or greater.


Sina Extension for Elementor – Cross Site Scripting (XSS)

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2025-6229
Number of Installations: 50,000+
Affected Software: Sina Extension for Elementor <= 3.7.0
Patched Versions: Sina Extension for Elementor 3.7.1

Mitigation steps: Update to Sina Extension for Elementor version 3.7.1 or greater.


Smart Custom Fields – Broken Access Control

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Broken Access Control
CVE: CVE-2026-4066
Number of Installations: 50,000+
Affected Software: Smart Custom Fields <= 5.0.6
Patched Versions: Smart Custom Fields 5.0.7

Mitigation steps: Update to Smart Custom Fields version 5.0.7 or greater.


Uncanny Automator – Easy Automation, Integration, Webhooks & Workflow Builder Plugin – Arbitrary File Upload

Security Risk: High
Exploitation Level: Requires Administrator or higher level authentication.
Vulnerability: Arbitrary File Upload
CVE: CVE-2026-2269
Number of Installations: 50,000+
Affected Software: Uncanny Automator – Easy Automation, Integration, Webhooks & Workflow Builder Plugin <= 7.0.9
Patched Versions: Uncanny Automator – Easy Automation, Integration, Webhooks & Workflow Builder Plugin 7.1.0

Mitigation steps: Update to Uncanny Automator – Easy Automation, Integration, Webhooks & Workflow Builder Plugin version 7.1.0 or greater.


WP-Members Membership Plugin – SQL Injection

Security Risk: High
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: SQL Injection
CVE: CVE-2026-2363
Number of Installations: 50,000+
Affected Software: WP-Members Membership Plugin <= 3.5.5
Patched Versions: WP-Members Membership Plugin 3.5.6

Mitigation steps: Update to WP-Members Membership Plugin version 3.5.6 or greater.


RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging – Cross Site Scripting (XSS)

Security Risk: High
Exploitation Level: No authentication required.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2026-2433
Number of Installations: 50,000+
Affected Software: RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging <= 5.0.11
Patched Versions: RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging 5.0.12

Mitigation steps: Update to RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging version 5.0.12 or greater.


Themes


Astra – Cross Site Scripting (XSS)

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2026-3534
Number of Downloads: 21,720,242
Affected Software: Astra <= 4.12.3
Patched Versions: Astra 4.12.4

Mitigation steps: Update to Astra theme version 4.12.4 or greater.


Blocksy – Cross Site Scripting (XSS)

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2026-2583
Number of Downloads: 6,306,227
Affected Software: Blocksy <= 2.1.30
Patched Versions: Blocksy 2.1.31

Mitigation steps: Update to Blocksy theme version 2.1.31 or greater.


Nirvana – Local File Inclusion

Security Risk: High
Exploitation Level: No authentication required.
Vulnerability: Local File Inclusion
CVE: CVE-2026-28119
Number of Downloads: 773,853
Affected Software: Nirvana <= latest
Patched Versions: No Fix

Mitigation steps: No patch available. Consider disabling or replacing the theme.


Education Zone – Broken Access Control

Security Risk: Medium
Exploitation Level: No authentication required.
Vulnerability: Broken Access Control
CVE: CVE-2026-25009
Number of Downloads: 483,880
Affected Software: Education Zone <= 1.3.8
Patched Versions: Education Zone 1.3.9

Mitigation steps: Update to Education Zone theme version 1.3.9 or greater.


Ona – Arbitrary File Upload

Security Risk: Critical
Exploitation Level: Requires Subscriber or higher level authentication.
Vulnerability: Arbitrary File Upload
CVE: CVE-2026-32482
Number of Downloads: 243,101
Affected Software: Ona <= 1.23
Patched Versions: Ona 1.24

Mitigation steps: Update to Ona theme version 1.24 or greater.


News Magazine X – Broken Access Control

Security Risk: High
Exploitation Level: No authentication required.
Vulnerability: Broken Access Control
CVE: CVE-2026-24382
Number of Downloads: 76,558
Affected Software: News Magazine X <= 1.2.50
Patched Versions: News Magazine X 1.2.51

Mitigation steps: Update to News Magazine X theme version 1.2.51 or greater.


Estate – PHP Object Injection

Security Risk: Critical
Exploitation Level: No authentication required.
Vulnerability: PHP Object Injection
CVE: CVE-2026-22475
Number of Downloads: 58,132
Affected Software: Estate <= latest
Patched Versions: No Fix

Mitigation steps: No patch available. Consider disabling or replacing the theme.


Update your website software to mitigate risk. Users who are not able to update their software with the latest version are encouraged to use a web application firewall to help virtually patch known vulnerabilities and protect their website.

Chat with Sucuri


文章来源: https://blog.sucuri.net/2026/04/vulnerability-patch-roundup-march-2026.html
如有侵权请联系:admin#unsafe.sh